lastID = -290437
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Description: Access Water
Context Menu
Description: Book cover
“My SCADA System is Secure” and other Security Myths
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2020-02-01 01:50:17 Administrator
  • 2020-02-01 01:50:16 Administrator
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: Book cover
“My SCADA System is Secure” and other Security Myths

“My SCADA System is Secure” and other Security Myths

“My SCADA System is Secure” and other Security Myths

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: Book cover
“My SCADA System is Secure” and other Security Myths
Abstract
Many utility managers believe their SCADA systems and networks are protected from tampering. They may utilize state-of-the-art firewalls, routers, VPN's, access control and other security measures that are administered by diligent system administrators. But are they really safe? Many times the answer is “no” even though the utility staff think they are impervious. In numerous vulnerability assessments of water and wastewater control systems, penetration studies have found significant vulnerabilities. Security professionals, using free, commonly-available hacking tools, have been able to easily access and control SCADA systems – sometimes within hours and without notice.This paper is intended to raise awareness regarding several essentials of SCADA and Cyber security, including:Sources of threats and how security professionals view the probability of attack.Known vulnerabilities to SCADA systems, potential points of attack and common ways a hacker could enter a system.Industry efforts to provide better security of SCADA systemsLegislation that would require Wastewater Systems to perform Vulnerability Assessments that include the SCADA and Cyber networks and systemsIncluded throughout this paper are several security “Myths”. These “Myths” represent misperceptions that have been encountered in the Water/Wastewater Industries.
Many utility managers believe their SCADA systems and networks are protected from tampering. They may utilize state-of-the-art firewalls, routers, VPN's, access control and other security measures that are administered by diligent system administrators. But are they really safe? Many times the answer is “no” even though the utility staff think they are impervious. In numerous...
Author(s)
David B. Kubel
SourceProceedings of the Water Environment Federation
SubjectSession 81 Management: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2003
ISSN1938-6478
SICI1938-6478(20030101)2003:5L.596;1-
DOI10.2175/193864703784606576
Volume / Issue2003 / 5
Content sourceWEFTEC
First / last page(s)596 - 602
Copyright2003
Word count194

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to '“My SCADA System is Secure” and other Security Myths'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: Book cover
“My SCADA System is Secure” and other Security Myths
Pricing
Non-member price: $11.50
Member price:
-290437
Get access
-290437
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to '“My SCADA System is Secure” and other Security Myths'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: Book cover
“My SCADA System is Secure” and other Security Myths
Abstract
Many utility managers believe their SCADA systems and networks are protected from tampering. They may utilize state-of-the-art firewalls, routers, VPN's, access control and other security measures that are administered by diligent system administrators. But are they really safe? Many times the answer is “no” even though the utility staff think they are impervious. In numerous vulnerability assessments of water and wastewater control systems, penetration studies have found significant vulnerabilities. Security professionals, using free, commonly-available hacking tools, have been able to easily access and control SCADA systems – sometimes within hours and without notice.This paper is intended to raise awareness regarding several essentials of SCADA and Cyber security, including:Sources of threats and how security professionals view the probability of attack.Known vulnerabilities to SCADA systems, potential points of attack and common ways a hacker could enter a system.Industry efforts to provide better security of SCADA systemsLegislation that would require Wastewater Systems to perform Vulnerability Assessments that include the SCADA and Cyber networks and systemsIncluded throughout this paper are several security “Myths”. These “Myths” represent misperceptions that have been encountered in the Water/Wastewater Industries.
Many utility managers believe their SCADA systems and networks are protected from tampering. They may utilize state-of-the-art firewalls, routers, VPN's, access control and other security measures that are administered by diligent system administrators. But are they really safe? Many times the answer is “no” even though the utility staff think they are impervious. In numerous...
Author(s)
David B. Kubel
SourceProceedings of the Water Environment Federation
SubjectSession 81 Management: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2003
ISSN1938-6478
SICI1938-6478(20030101)2003:5L.596;1-
DOI10.2175/193864703784606576
Volume / Issue2003 / 5
Content sourceWEFTEC
First / last page(s)596 - 602
Copyright2003
Word count194

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2024 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
David B. Kubel. “My SCADA System is Secure” and other Security Myths. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Web. 8 Jun. 2025. <https://www.accesswater.org?id=-290437CITANCHOR>.
David B. Kubel. “My SCADA System is Secure” and other Security Myths. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Accessed June 8, 2025. https://www.accesswater.org/?id=-290437CITANCHOR.
David B. Kubel
“My SCADA System is Secure” and other Security Myths
Access Water
Water Environment Federation
December 22, 2018
June 8, 2025
https://www.accesswater.org/?id=-290437CITANCHOR